Extended Key Usages
ExtKeyUsageCodeSigning
Static task
static1
Behavioral task
behavioral1
Sample
67ab409aa9442b23c6d195addce6a32f_JaffaCakes118.exe
Resource
win7-20240708-en
Target
67ab409aa9442b23c6d195addce6a32f_JaffaCakes118
Size
179KB
MD5
67ab409aa9442b23c6d195addce6a32f
SHA1
23eff0def6c978b7efbd084abbd5dbe32fa1dda7
SHA256
9c2681c46779c0d4307c3159b14254c36de443fda1d9b13d8149de8260b81a77
SHA512
5acd82807dd052d3e389a51d8f2e3393ea6eb153ba7adbf5868c3a3db67a890c5f382ddfbeaf1eb1ff5470308e34fe259b0319b3bf6459864711a4d7c66c512d
SSDEEP
3072:vaXitKNtmlphxLDTMcbHjqgm3BS8DVMByXBvVZ1A:yXi8/gp3TPDrm3BpLRva
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
EnterCriticalSection
ExitProcess
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileExW
FindNextFileW
FlushFileBuffers
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetConsoleAliasA
GetConsoleCP
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentStringsW
GetFileAttributesExA
GetFileType
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleExW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeW
GetSystemDirectoryA
GetSystemTime
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
Heap32ListFirst
HeapAlloc
HeapFree
HeapReAlloc
EncodePointer
InitializeCriticalSectionAndSpinCount
InitializeSListHead
IsBadCodePtr
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
LCMapStringW
LeaveCriticalSection
LoadLibraryExW
LoadLibraryW
LocalFileTimeToFileTime
LocalFree
MultiByteToWideChar
OpenEventW
OpenThread
OpenWaitableTimerW
OutputDebugStringW
QueryPerformanceCounter
RaiseException
ReadConsoleA
ReadFileScatter
ResumeThread
RtlUnwind
SetConsoleCtrlHandler
SetFileAttributesA
SetFilePointer
SetFilePointerEx
SetFileTime
SetLastError
SetLocaleInfoA
SetStdHandle
SetSystemTimeAdjustment
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WaitForSingleObject
WideCharToMultiByte
WriteConsoleW
WriteFile
_lread
DosDateTimeToFileTime
DeleteCriticalSection
DecodePointer
CreateTimerQueueTimer
CreateProcessW
CreateHardLinkA
CreateFileW
CreateFileA
CloseHandle
AssignProcessToJobObject
GetModuleHandleA
HeapSize
VirtualAlloc
GetMessagePos
GetTopWindow
CharNextExA
CreateDialogParamA
CreateIconFromResource
DdeCreateStringHandleA
DestroyWindow
DispatchMessageA
EnableMenuItem
FlashWindow
GetDCEx
GetMessageTime
GetSystemMenu
TranslateAccelerator
SendDlgItemMessageA
PeekMessageA
InvalidateRgn
GetMetaRgn
Escape
BitBlt
RectVisible
PolyPolygon
CreateHalftonePalette
DeleteObject
RegCloseKey
RegOpenKeyA
RegQueryValueExW
RegOpenKeyExW
SHGetSpecialFolderPathW
SHFreeNameMappings
SHGetDataFromIDListW
SHGetDiskFreeSpaceExW
SHGetFileInfoA
CommandLineToArgvW
DragQueryFile
DragQueryFileA
DragQueryFileAorW
DuplicateIcon
ExtractAssociatedIconExA
ExtractAssociatedIconExW
ExtractAssociatedIconW
ExtractIconEx
ExtractIconExA
ExtractIconExW
SHAppBarMessage
Shell_NotifyIconA
Shell_NotifyIcon
ShellExecuteW
ShellExecuteExA
ShellExecuteA
SHQueryRecycleBinW
SHPathPrepareForWriteW
SHLoadInProc
SHGetFileInfoW
SHGetPathFromIDListW
SHCreateDirectoryExA
StrCmpNIA
StrRChrIA
StrStrIA
StrCmpNA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ